option
Cuestiones
ayuda
daypo
buscar.php
TEST BORRADO, QUIZÁS LE INTERESE: PICc_200
COMENTARIOS ESTADÍSTICAS RÉCORDS
REALIZAR TEST
Título del Test:
PICc_200

Descripción:
Esto es un test para evaluar conocimientos

Autor:
AVATAR
lmoralesc
OTROS TESTS DEL AUTOR

Fecha de Creación:
03/05/2024

Categoría: Otros

Número Preguntas: 119
COMPARTE EL TEST
COMENTARNuevo Comentario
No hay ningún comentario sobre este test.
Temario:
Which of the following nmcli subcommands exist? (Choose two.) nmcli connection nmcli device nmcli wifi nmcli address nmcli ethernet.
Which of the following changes may occur as a consequence of using the command ip? (Choose three.) IP addresses may change. The system’s host name may change. New name servers may be added to the resolver configuration. The routing table may change. Network interfaces may become active or inactive.
How many IP addresses can be used for unique hosts inside the IPv4 subnet 192.168.2.128/26? 6 126 62 30 14.
Which of the following IPv4 networks are reserved by IANA for private address assignment and private routing? (Choose three.) 192.168.0.0/16 127.0.0.0/8 172.16.0.0/12 169.255.0.0/16 10.0.0.0/8.
Which of the following commands configure network interfaces based on the system’s existing distributionspecific configuration files? (Choose two.) ifpause ifstart ifup ifdown ifconf.
Which of the following statements is true if the UID of a regular user is identical to the GID of a group? The user is the only member of the group, even if the group configuration contains other members. GIDs have precedence over UIDs, therefore the group is available while the user isn’t. UID have precedence over GIDs, therefore the user is available while the group doesn’t. UIDs and GIDs are independent of each other, therefore the user as well as the group are still available. The user as well as the group are not available to avoid ambiguity due to the ID conflict.
Which of the following information is stored in /etc/shadow for each user? The path to the user’s home directory. The user’s private SSH keys. The timestamp of the user’s last login. The hashed password of the user. The numerical user ID (UID).
Which of the following commands shows all active systemd timers? timeq systemctl –t timectl list systemctl-timer show systemctl list-timers.
Which of the following tasks can the date command accomplish? (Choose two.) Set the system’s date but not the time. Print a calendar for a month or a year. Calculate the time span between two dates. Display time in a specific format. Set the system’s date and time.
Which of the following is a valid IPv6 address? 2001:db8:0g21::1 2001%db8%9990%%1 2001.db8.819f..1 2001::db8:4581::1 2001:db8:3241::1.
What can be specified with useradd? (Choose two.) The SSH keys used to login to the new account. The numeric user ID (UID) of the user. The absolute path to the user’s home directory. Which printers are available for the new user. Commands the user can run using sudo.
Which if the following tools, used for DNS debugging, reports not only the response from the name sever but also details about the query? dnslookup dnsq dig zoneinfo hostname.
Which of the following statements is valid in the file /etc/nsswitch.conf? hosts: files dns namespaces: net mount procs multi on 192.168.168.4 dns-server include /etc/nsswitch.d/.
Which of the following connection types, as seen in nmcli connection show, may exist in NetworkManager? (Choose three.) ipv6 ethernet wifi tcp bridge.
On a Linux workstation, the route command takes a long time before printing out the routing table. Which of the following errors does that indicate? The local routing information may be corrupted and must be re-validated using a routing protocol. There may accidentally be more than one default router in which case a default router election has to be done on the network in order to choose one router as the default. One of the routers in the routing table is not available which causes the automatic router failure detection mechanism (ARF-D) to wait for a timeout. The Linux Kernel Routing Daemon (LKRD) is not running and should be started using its init script or systemd uni DNS resolution may not be working as route by default tries to resolve names of routers and destinations and may run into a timeout.
What is true about the Hop Limit field in the IPv6 header? Each router forwarding the packet increases the field’s value. The field is not changed during the transport of a package. The field is transmitted within a hop-by-hop extension header. Each router forwarding the packet decreases the field’s value. For multicast packages, the field’s value is always 1.
Which command is used to set the hostname of the local system? (Specify only the command without any path or parameters.).
Which file, if present, must contain all users that are allowed to use the cron scheduling system? (Specify the full name of the file, including path.).
Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.).
Which command included in NetworkManager is a curses application which provides easy acces to the NetworkManager on the command line? (Specify only the command without any path or parameters.).
What is true about the file /etc/localtime It is a plain text file containing a string such as Europe/Berlin. It is either a symlink to or a copy of a timezone information file such as /usr/share/zoneinfo/ Europe/Berlin. It is created and maintained by the NTP service based on the location of the system’s IP address. After changing this file, newtzconfig has to be run to make the changes effective. It is a symlink to /sys/device/clock/ltime and always contains the current local time.
Which option in the chrony configuration file changes the initial interval of polls to a NTP server in order to speed up the initial synchronization? iburst fast quickstart fsync flood.
Which of the following commands is used to rotate, compress, and mail system logs? rotatelog logrotate syslogd –-rotate logger striplog.
Why is the correct configuration of a system’s time zone important? Because the time zone is saved as part of the modification times of files and cannot be changed after a file is created. Because NTP chooses servers nearby based on the configured time zone. Because the environment variables LANG and LC_MESSAGES are, by default, set according to the time zone. Because the conversion of Unix timestamps to local time relies on the time zone configuration. Because the timezone is included in checksum calculations and timezone changes invalidate existing checksums.
Which of the following commands lists all queued print jobs? lp lsq lpq lpd lpr.
Which of the following entries in /etc/syslog.conf writes all mail related events to the file /var/log/ maillog and sends all critical events to the remote server logger.example.com? mail.* /var/log/maillog mail,crit @logger.example.org mail.* /var/log/maillog mail.crit syslog://logger.example.org mail.* /var/log/maillog mail.crit @logger.example.org mail /var/log/maillog mail.crit @logger.example.org mail * /var/log/maillog mail crit @logger.example.org.
Which of the following protocols is related to the term open relay? IMAP POP3 LDAP NTP SMTP.
Which of the following commands displays all environment and shell variables? lsenv getargs ls env lsshell.
Which of the following statements is true regarding systemd timer units? Each systemd timer unit controls a specific systemd service unit. Timer units can only be defined within a service unit’s file. The command executed by the timer is specified in the timer unit’s [Cmd] section. Timer units only exist in the system scope and are not available for users. A dedicated system service, systemd-cron, handles the execution of timer units.
Which of the following comparison operators for test work on elements in the file system? (Choose two.) –z –f –lt –d –eq.
Which of the following fields are available in the standard format of both the global /etc/crontab file as well as in user-specific crontab files? (Choose two.) Minute Effective group ID Username Command Year.
Which of the following commands should be executed when starting a login shell in order to change the language of messages for an internationalized program to Portuguese (pt)? export LANGUAGE=“pt” export UI_MESSAGES=“pt” export ALL_MESSAGES=“pt” export MESSAGE=“pt” export LC_MESSAGES=“pt”.
Which of the following files assigns a user to its primary group? /etc/pgroup /etc/shadow /etc/passwd /etc/group /etc/gshadow.
Which of the following steps prevents a user from obtaining an interactive login session? Setting the UID for the user to 0. Running the command chsh –s /bin/false with the user name. Adding the user to /etc/noaccess. Creating a .nologin file in the user’s home directory. Removing the user from the group staff.
Which of the following statements about systemd-journald are true? (Choose three.) It maintains metadata such as _UID or _PID for each message. It supports syslog facilities such as kern, user, and auth. It only processes messages of systemd and not messages of any other tools. It can pass log messages to syslog for further processing. A. It is incompatible with syslog and cannot be installed on a system using regular syslog.
Which command, available with all sendmail-compatible MTAs, is used to list the contents of the MTA’s mail queue? (Specify only the command without any path or parameters.).
What is the top-level directory which contains the configuration files for CUPS? (Specify the full path to the directory.).
Which option in the /etc/ntp.conf file specifies an external NTP source to be queried for time information? (Specify only the option without any values or parameters.).
Which command must be run after adding a new email alias to the configuration in order to make this change effective? (Specify the command without any path but including all required parameters.).
What information is provided by the echo $$ command? The process ID of the last command executed. The process ID for the following command. The process ID of the current shell. The process ID of the last command which has been placed in the background. The process ID of the echo command.
Given the following excerpt of the sudo configuration: jane ANY=NOPASSWD: /bin/kill, /bin/id, PASSWD: /sbin/fdisk Which of the following statements are true? (Choose three.) Jane can run /bin/id without specifying her password. Jane can run /bin/kill without specifying a password. Jane can run /sbin/fdisk after specifying root’s password. Jane can run /sbin/fdisk after specifying her password. Jane can run /bin/id only after specifying her password.
Which configuration file contains the default options for SSH clients? /etc/ssh/client etc/ssh/ssh etc/ssh/sshd_config /etc/ssh/ssh_client /etc/ssh/ssh_config.
Depending on a system’s configuration, which of the following files can be used to enable and disable network services running on this host? /etc/profile /etc/ports /etc/services /etc/host.conf /etc/xinetd.conf.
Which of the following commands can identify the PID of a process which opened a TCP port? strace ptrace debug lsof nessus.
Which of the following commands preloads and manages existing SSH keys that are used for automatic authentication while logging in to order machines using SSH? ssh-agent ssh-keyring ssh-keygen ssh-pki sshd.
On a machine running several X servers, how do programs identify the different instances of the X11 server? By a device name like /dev/X11/xservers/1. By a display name like: 1. By a fixed UUID that is defined in the X11 configuration file. By the name of the user that runs the X server like x11:bob. By a unique IPv6 address from the fe80::/64 subnet.
What is the purpose of a screen reader? It reads displayed text to accommodate the needs of blind or visually impaired people. It displays lines and markers to help people use speed reading techniques. It manages and displays files that contain e-books. It reads the parameters of the attached monitors and creates an appropriate X11 configuration. It manages virtual keyboards on touch screen displays.
The X11 configuration file xorg.conf is grouped into section. How is the content of the section SectionName represented? It is placed between a line containing Section “SectionName” and a line containing EndSection. It is placed after an initial unindented Section “SectionName” and must be indented by exactly one tab character. It is placed between the tags <Section name=“SectionName”> and </Section>. It is placed after the row [SectionName]. It is placed in curly brackets as in Section SectionName {…}.
Which command makes the shell variable named VARIABLE visible to subshells? env VARIABLE set $VARIABLE export $VARIABLE export VARIABLE set VARIABLE.
Which of the following features are provided by SPICE? (Choose two.) Connecting local USB devices to remote applications. Uploading and running a binary program on a remote machine. Replacing Xorg as local X11 server. Accessing graphical applications on a remote host. Downloading and locally installing applications from a remote machine.
What output is produced by the following command sequence? echo ‘1 2 3 4 5 6’ | while read a b c; do echo result $c $b $a; done result: 6 5 4 result: 3 4 5 6 2 1 result: 3 2 1 result: 1 2 3 4 5 6 result: 6 5 4 3 2 1.
Which of the following configuration files should be modified to globally set shell variables for all users? /etc/.bashrc /etc/shellenv ~/.bash_profile /etc/bashrc /etc/profile.
What output does the command seq 10 produce? The numbers 1 through 10 with one number per line. A continuous stream of numbers increasing in increments of 10 until the command is stopped. The number 10 to standard output. The number 0 through 9 with one number per line. It creates no output because a second parameter is missing.
Which of the following commands can be used to limit the amount of memory a user may use? chage passwd ulimit umask usermod.
What is a purpose of an SSH host key? It authenticates any user that logs into a remote machine from the key’s host. It must be sent by any SSH client in addition to a user key in order to identify the client’s host. It is used by system services like cron, syslog or a backup job to automatically connect to remote hosts. It provides the server’s identity information to connecting SSH clients. It is root key by which all user SSH keys must be signed.
What is the purpose of TCP wrapper? Bind a network service to a TCP port. Add SSL support to plain text TCP services. Limit access to a network service. Manage and adjust bandwidth used by TCP services. Encapsulate TCP messages in IP packets.
When using X11 forwarding in SSH, what environment variable is automatically set in the remote shell in order to help applications to connect to the correct X11 server? (Specify only the environment variable without any additional commands or values.).
The presence of what file will temporarily prevent all users except root from logging into a system? (Specify the full name of the file, including path.).
What command list the aliases defined in the current Bash shell? (Specify only the command without any path or parameters.).
Where is the systemd journal stored? /var/log/syslog.bin or /var/log/syslog.jrn /proc/log/ and /proc/klog/ /etc/systemd/journal/ or /usr/lib/systemd/journal/ /var/jlog/ and /var/jlogd/ /run/log/journal/ or /var/log/journal/.
Which of the following options in the chrony configuration file define remote time sources? (Choose two.) source clock server pool remote.
Which of the following situations is observed and corrected by an NTP client? Changes in the time zone of the current computer’s location. The skew in time between the system clock and the reference clock. The physical location and the timezone configuration. The skew in time between the system clock and the computer’s hardware clock. Adjustment needed to support Daylight Saving Time.
If an alias ls exists, which of the following commands updates the alias to point to the command ls -l instead of the alias’s current target? alias --force ls=’ls -l’ set ls=’ls -l’ realias ls=’ls -l’ alias ls=’ls -l’ alias --update ls ls=’ls -l’.
Which of the following commands puts the output of the command date into the shell variable mydate? mydate=”exec date” mydate=”$((date))” mydate=”date” mydate=”${date}” mydate=”$(date)”.
What information is shown by the echo $? command? The process ID of the current shell. The process ID which will be used for the next command. The process ID of the echo command. The exit value of the command executed immediately before echo. The exit value of the echo command.
Which of the following files is not read directly by a Bash login shell? /etc/profile ~/.bashrc ~/.profile ~/.bash_profile ~/.bash_login.
What is true about the file .profile in a user’s home directory? It must use a valid shell script syntax. It must start with a shebang. It must be executable. It must be readable for its owner only. It must call the binary of the login shell.
What is true regarding the statement beginning with #! that is found in the first line of script? (Choose two.) It prevents the scripts from being executed until the ! is removed. it triggers the installation of the script’s interpreter. It defines the character encoding of the script. It is a comment that is ignored by the script interpreter. It specifies the path and the arguments of the interpreter used to run the script.
What output does the command seq 1 5 20 produce? 1 6 11 16 1 5 10 15 1 5 10 15 5 10 15 20 1 2 3 4.
Which of the following is true regarding the command sendmail? All common MTAs, including Postfix and Exim, provide a sendmail command. The sendmail command prints the MTA’s queue history of which mails have been sent successfully. With any MTA, the sendmail command must be run periodically by the cron daemon. When using systemd, sendmail is an alias to relayctl. It is only available when the sendmail MTA is installed.
Which of the following commands lists all defines variables and functions within Bash? export env set echo $ENV env -a.
Which file inside the CUPS configuration directory contains the settings of the printers? cupsd.conf cups-devices.conf snmp.conf printcap.conf printers.conf.
Which of the following are syslog facilities? (Choose two.) local5 mail remote postmaster accounting.
Which of the following parameters are used for journalctl to limit the time frame of the output? (Choose two.) --from= --upto= --until= --date= --since=.
Which of the following commands display a list of jobs in the print queue? (Choose two.) lprm -l lpq lpstat cups --list lpr -q.
On a system using systemd-journald, which of the following commands add the message Howdy to the system log? (Choose two.) journalctl add Howdy append Howdy logger Howdy systemd-cat echo Howdy echo Howdy > /dev/journal.
Which command is used to sync the hardware clock to the system clock? (Specify only the command without any path or parameters.).
Which file is processed by newaliases? (Specify the full name of the file, including path.).
What information related to a user account is modified using the chage command? Default permissions for new files Set of commands available to the user Password expiry information Default ownership for new files Group membership.
Which of the following is true about IPv6? IPv4 addresses can be used without any change with IPv6. For IPv6, UDP and TCP have been replaced by the Rapid Transmission Protocol RTP IPv6 no longer supports multicast addresses. IPv6 no longer supports broadcast addresses. With IPv6, the TCP port numbers of most services have changed.
What is true about the following command? nmcli device wifi connect WIFIoI NetworkManager creates a new wifi connection WIFIoI and activates it. NetworkManager opens a new public hotspot with the SSID WIFIoI. NetworkManager returns an error because WIFIoI is an invalid wifi device. NetworkManager creates an unconfigured new virtual network interface named WIFIoI. NetworkManager returns an error in case the connection WIFIoI does not exist.
82 - Which of the commands below might have produced the following output? dig -t mx www.example.org dig -t soa www.example.org dig www.example.org dig -t ns www.example.org dig -t a www.example.org.
Which of the following states can NetworkManager show regarding the system’s network connectivity? portal firewalled login-required full up.
Which of the following are valid host addresses for the subnet 203.0.113.64/28? (Choose two.) 203.0.113.65 203.0.113.64 203.0.113.78 203.0.113.81 203.0.113.80.
Which of the following keywords can be used in the file /etc/resolv/conf? (Choose two.) nameserver lookup method search substitute.
How does the ping command work by default? It sends a TCP SYN packet to a remote host and waits to receive an TCP ACK response in return. Is sends an ICMP Echo Request to a remote host and waits to receive an ICMP Echo Response in return. t sends a UDP packet to port 0 of the remote host and waits to receive a UDP error response in return. It sends an ARP request to a remote host and waits to receive an ARP response in return. Is sends a broadcast packet to all hosts on the net and waits to receive, among others, a response from the target system.
Which of the following commands display the number of bytes transmitted and received via the eth0 network interface? (Choose two.) ifconfig eth0 ip -s link show eth0 route -v via eth0 netstat -s -i eth0 ip stats show dev eth0.
Which command is used to set restrictions on the size of a core file that is created for a user when a program crashes? edquota ktrace core quota ulimit.
How would an outgoing packet to the destination 192.168.2.150 be handled? It would be passed to the default router 192.168.178.1 on wlan0 It would be directly transmitted on the device eth0. It would be passed to the default router 255.255.255.0 on eth0. It would be passed to the router 192.168.1.1 on eth0. It would be directly transmitted on the device wlan0.
How do shadow passwords improve the password security in comparison to standard no-shadow password? Shadow passwords are always combined with a public key that has to match the user’s private key. Regular users do not have access to the password hashes of shadow passwords. Shadow passwords are stored in plain text and can be checked for weak passwords. The system’s host key is used to encrypt all shadow passwords. Every shadow password is valid for 45 days and must be changed afterwards.
After editing the TCP wrapper configuration to grant specific hosts access to a service, when do these changes become effective? The new configuration becomes effective after restarting the tcpd service. The new configuration becomes effective at the next system reboot. The new configuration becomes effective when the last established connection to the service is closed. The new configuration becomes effective immediately for all new connections. The new configuration becomes effective after restarting the respective service.
What is true regarding public and private SSH keys? (Choose two.) For each user account, there is exactly one key pair that can be used to log into that account. To maintain the private key’s confidentiality, the SSH key pair must be created by its owner. Several different public keys may be generated for the same private key. The private key must never be revealed to anyone. To allow remote logins, the user’s private key must be copied to the remote server.
Which of the following commands finds all files owned by root that have the SetUID bit set? find / -owner 0 -permbits 0x100000000 find / -user 0 -mode +s find / -owner root -setuid find / --filter uid=1 --filter pers=u+s find / -user root -perm -4000.
Which mechanism does ssh use to interact with the SSH agent? Connecting to port 2222 which is used by the system-wide SSH agent. Starting ssh-agent as a child process for each ssh invocation. Evaluating environment variables such as SSH_AUTH_SOCK. Using the fixed socket .ssh-agent/ipc. Creating an alias replacing ssh with calls to ssh-agent.
Which parameter of the ssh command specifies the location of the private key used for login attempts?(Specify only the option name without any values or parameters.).
Which parameter is missing in the command ip link set ____ dev eth0 to activate the previously inactive network interface eth0? (Specify the parameter only without any command, path or additional options.).
What command is used to add OpenSSH private keys to a running ssh-agent instance? (Specify the command name only without any path.).
Which directory holds configuration files for xinetd services? (Specify the full path to the directory.).
Which of the following commands will delete the default gateway from the system’s IP routing table? ip route del default netstat -r default sysctl ipv4.default_gw=0 route del default ifconfig unset default.
Which of the following fields can be found in the /etc/group file? (Choose two.) The default group ACL. The list of users that belong to the group. The home directory of the group. The description of the group. The name of the group.
Which of the following sections exists in a systemd timer unit? [Trigger] [Timer] [Events] [cron] [Schedule].
Which of the following getent invocations lists all existing users? getent uids getent passwd getent logins getent users getent homes.
Given the following user’s crontab entry: 15 14 * * 1-5 /usr/local/bin/example.sh At 14:15 local time, 1st to 5th day of month. At 14:15 local time, February till June. At 15:14 local time, 1st to 5th day of month. At 14:15 local time, January till May. At 14:15 local time, Monday to Friday.
If neither cron.allow nor cron.deny exist in /etc/, which of the following is true? The cron daemon will refuse to start and report missing files in the system’s logfile. Without additional configuration, only root may create user specific crontabs. When a user creates a user specific crontab the system administrator must approve it explicitly. Without additional configuration, all users may create user specific crontabs. The default settings of /etc/crond.conf define whether or not user specific crontabs are generally allowed or not.
What is the purpose of the iconv command? It verifies that the root directory tree compiles to all conventions from the Filesystem Hierarchy Standard (FHS) It converts files from one character set to an other. It displays additional meta information from icon files ending in .ico. It changes the mode of an inode in the ext4 filesystem. It converts bitmap images from one format to another such as PNG to JPEG.
Which character in the password field of /etc/passwd is used to indicate that the encrypted password is stored in /etc/shadow? # s - * x.
What does the term Braille Display refer to? A physical representation of characters using small dots. A standardized high contract graphical theme for desktop applications? A Linux desktop environment similar to KDE and GNOME. A standard file format for data exchange, similar to XML. A legacy display technology superseded by LCD.
Which of the following tasks are handled by a display manager like XDM or KMD? (Choose two.) Configure additional devices like new monitors or projectors when they are attached. Handle the login of a user. Lock the screen when the user was inactive for a configurable amount of time. Create an X11 configuration file for the current graphic devices and monitors. Start and prepare the desktop environment for the user.
Which of the following protocols is designed to access the video card output of a virtual machine? Xfce SPICE XDMCP KDE X11.
What is true about NetworkManager on a Linux system that uses its distribution’s mechanisms to configure network interfaces? (Choose two.) NetworkManager reconfigures all network interfaces to use DHCP unless they are specifically managed by NetworkManager. NetworkManager must be explicitly enabled for each interface it should manage. NetworkManager can be configured to use the distribution’s network interface configuration. NetworkManager by default does not change interfaces which are already configured. NetworkManager disables all interfaces which were not configured by NetworkManager.
Which standardized TCP port is used by HTTPS services? 25 8080 636 80 443.
Which of the following environment variables can be defined in locale.conf? (Choose two.) LC_GEOGRAPHY LC_USERNAME LC_ALL LC_TIME LC_UTF8.
Which of the following commands sets the system’s time zone to the Canadian Eastern Time? modprobe tz_ca_est localegen -t -f /usr/share/zoneinfo/Canada/Eastern > /etc/locate.tz sysctl -w clock.tz=’Canada/Eastern’ ln -sf /usr/share/zoneinfo/Canada/Eastern /etc/localtime tzconf /etc/localtime.
How can a specific user be prevented from scheduling tasks with at? By adding the specific user to the nojobs group. By adding the specific user to the /etc/at.deny file. By adding the specific user to the /etc/at.allow file. By executing the atd --deny [user] command. By adding the specific user to the [deny] section in the /etc/atd.conf file.
Which file contains the data of the last change of a user’s password? /etc/passwd /etc/shadow /var/log/shadow /etc/pwdlog /etc/gshadow.
Which environment variable is used by an X11 client to determine the X Server to connect to? (Specify only the variable name without any preceding commands or values.).
What command enables a network interface according to distribution-specific configuration, such as /etc/network/interfaces or /etc/sysconfig/network-scripts/ifcfg-eth0? (Specify only the command without any path or parameters.).
What option to useradd creates a new user’s home directory and provisions it with a set of standard files? (Specify only the option name without any values or parameters.) .
Which command included in systemd supports selecting messages from the systemd journal by criteria such as time or unit name? (Specify only the command without any path or parameters.).
Denunciar Test